Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
The possibilities of collisions application of control features in the code of conditional residues in terms of threats for the integrity of information objects have been investigated. Tabl.: 1. Refs: 7 titles.
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Mаtоv, O. Y., Vаsylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2015
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100320 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
The concept of a hybrid technology for remote detection of explosive objects in coastal shallow water areas
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Long-term data storage media
by: Petrov, V. V., et al.
Published: (2018)
by: Petrov, V. V., et al.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
The integrity support for the semantic layer of the corporate intelligent systems’ common information space
by: Храмова, І. О.
Published: (2021)
by: Храмова, І. О.
Published: (2021)
The method of parametric adaptation of the check polynomials of the component recursive systematic convulsion code turbo code
by: Kurbet, Pavlo M., et al.
Published: (2024)
by: Kurbet, Pavlo M., et al.
Published: (2024)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
Analytical identification of three-dimensional geometric objects by information about the shape of their cross-sections
by: Литвинова, Ю. С., et al.
Published: (2017)
by: Литвинова, Ю. С., et al.
Published: (2017)
Analytical identification of three-dimensional geometric objects by information about the shape of their cross-sections
by: Литвинова, Ю. С., et al.
Published: (2017)
by: Литвинова, Ю. С., et al.
Published: (2017)
Geophysical threats of wartime to high-risk objects of Ukraine
by: Anakhov, P.V.
Published: (2022)
by: Anakhov, P.V.
Published: (2022)
Features of the use of an automated seismic acoustic complex by a combined method of detection objects
by: Nikiforov, M. M., et al.
Published: (2018)
by: Nikiforov, M. M., et al.
Published: (2018)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Mathematical Models of Moving Objects
by: Tsybulska, Е. O.
Published: (2012)
by: Tsybulska, Е. O.
Published: (2012)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Integration of environmental safety into mechanisms for combating energy threats to residential buildings
by: Hamotskyi, Roman
Published: (2025)
by: Hamotskyi, Roman
Published: (2025)
PARAMETER PRIORITY ANALYSIS TO EVALUATE THE PROSPECT OF GEOTHERMAL OBJECTS UTILIZATION
by: Barylo, А.
Published: (2020)
by: Barylo, А.
Published: (2020)
ANALYSIS OF HYDROGEOLOGICAL AND GEOTHERMIC CHARACTERISTICS OF THE GEOTHERMAL OBJECTS OF UKRAINE
by: Barylo, А.
Published: (2020)
by: Barylo, А.
Published: (2020)
High-tempe-rature reflective coatings for long-term storage media
by: Petrov, V. V., et al.
Published: (2019)
by: Petrov, V. V., et al.
Published: (2019)
The solution of problem on grouping mobile objects in monitoring systems using clustering techniques
by: Yuzefovich, V. V.
Published: (2015)
by: Yuzefovich, V. V.
Published: (2015)
Information technologies of application architecture`s IT services
by: Dovgiy, Stanislav O., et al.
Published: (2023)
by: Dovgiy, Stanislav O., et al.
Published: (2023)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Optimization of Information Volume in a Partially Decentralized Decision Support System
by: Савченко, М. М., et al.
Published: (2023)
by: Савченко, М. М., et al.
Published: (2023)
USING OF OBJECT-ORIENTED DESIGN PRINCIPLES IN ELECTRIC MACHINES DEVELOPMENT
by: Zablodskii, N. N., et al.
Published: (2016)
by: Zablodskii, N. N., et al.
Published: (2016)
An approach to evaluation of survivability of scientific publications in the long-term storage in the Internet environment
by: Lande, D. V., et al.
Published: (2013)
by: Lande, D. V., et al.
Published: (2013)
Technologies for manufacturing optical media for long-term data storage
by: Petrov, V. V., et al.
Published: (2017)
by: Petrov, V. V., et al.
Published: (2017)
Multi-Objective Optimization in Intelligent Decision Support Systems
by: Sirodgea, I. B., et al.
Published: (2012)
by: Sirodgea, I. B., et al.
Published: (2012)
GEOSITES AS OBJECTS OF NATURAL RESERVE FUND (PROBLEMATIC ISSUES)
by: Samoilenko, L. V.
Published: (2020)
by: Samoilenko, L. V.
Published: (2020)
TARGET ORIENTED EXPERT SYSTEMS FOR GEOLOGICAL OBJECTS
by: KHRUSHCHOV, D., et al.
Published: (2012)
by: KHRUSHCHOV, D., et al.
Published: (2012)
Similar Items
-
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)